FBI’s Cybercrime Report 2017

The FBI’s Internal Crime Complaint Center (IC3) has just released its annual Internet Crime Report, where it outlines the most recent attack vectors of internet scammers and fraudsters, as well as cyber-criminal trends over the past year.

The Report is a comprehensive yet short and to-the-point document in which people can read the IC3’s findings and recommendations. The FBI division notes which groups of people are more likely to fall for these schemes, but the Report is aimed at everyone regardless of age or occupation.

Cyber-security is a serious issue and crimes of this nature have become increasingly more targeted. This year, the FBI started breaking down the report by states as well to show each of the 50 states their statistics and how to combat potential threats.

2017 IC3 Internet Crime Report: Demographic Highlights
The Internal Crime Complaint Center of the FBI receives 280,000 complaints per year in average, and since its inception in the year 2000, it has received almost 4 million reports. This year’s investigations show that the trend continued during 2016 but was a little higher, totaling 266,685 victims of Internet crime last year alone. The IC3 separates this population into five age groups to show which has a higher propensity to become a target.

People under 20 were the least affected group, amounting to just over 10,000 victims and nearly $7 million taken from them. Those between 20 and 29, however, saw ten times as many losses at $68 million and 46,300 people scammed approximately.
The group of victims ranging from 30 to 39 years old was the second most affected demographic, with almost 54,500 victims but just $190 million in losses. In contrast, 55,000 people over 60 fell for Internet scams and handed over close to $340 million.

A marked trend this year was the fact that losses increased with age. The older the group, the more money they got scammed out of them, as shown by the $224 and $298 million that those in their 40s and 50s got stolen respectively.

IC3 report: Trends and Recommendations
In the US, the most vulnerable states were California, New York, and Florida; while Canada topped the list of foreign victims surveyed at 3,722. India, the UK, Australia, and France also made the top 5.
The Internet crimes most committed had non-payment/non-delivery instances in the first place, with more than 81,000 reported incidents in which people were not paid for their services or didn’t receive the product they ordered.
Personal data breaches came second with close to 30,000 incidences, followed by 25,000 accounts of Nigerian 419 scams. These fraudulent requests rely on people wiring money to third parties on behalf of others asking for help because they allegedly cannot do it themselves.

Phishing cases were almost 20,000 in 2016, and extortion, identity theft, and credit card fraud all ranked in the high 10,000s. The most profitable crimes, however, business email compromise (BEC) attacks, making cyber criminals more than $360 million last year.

Confidence fraud schemes placed second on the list for victims’ loss, with close to $220 million spent by people in fake online relationships. Fraudulent investments, corporate data breaches, and cases of identity theft were also highly profitable. 

As most cyber security firms would advise, the IC3 recommends users to simply keep their operating systems and antiviruses up to date as a preemptive measure. The government agency also suggested common sense in social media, stronger passwords, and tighter authentication methods.

The USB Port

You Might Also Read:

Intelligence-Led Policing Gets Automated:

UK Fraud Hotspots Revealed:

Six Seconds To Hack A Credit Card:

 

« GDPR Guidance For May 2018
Breaking Down Hotel Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

SecuriThings

SecuriThings

SecuriThings is a User and Entity Behavioral Analytics (UEBA) solution for IoT security.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

SGTech

SGTech

SGTech is the leading trade association for Singapore's tech industry, offering focused support and development to both strategic and emerging sectors in the industry.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.